Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How Threat Hunting Builds Readiness

    October 14, 2025

    SonicWall VPNs face a breach of their own after the September cloud-backup fallout

    October 14, 2025

    The best Apple TV VPNs of 2025: Expert tested and reviewed

    October 14, 2025
    Facebook X (Twitter) Instagram
    Trending
    • How Threat Hunting Builds Readiness
    • SonicWall VPNs face a breach of their own after the September cloud-backup fallout
    • The best Apple TV VPNs of 2025: Expert tested and reviewed
    • npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
    • India’s Airbound bags $8.65M to build rocket-like drones for one-cent deliveries
    • Vom CISO zum Chief Risk Architect
    • Beware of getting your product buying advice from AI for one big reason, says Ziff Davis CEO
    • New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»News»Be careful where you click in Google search results – it could be damaging malware
    News

    Be careful where you click in Google search results – it could be damaging malware

    TechurzBy TechurzJuly 8, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Global Warning. Alert Sign On World Map
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Arctic Wolf spotted SEO-optimized fake download pages
    • The sites spoofed PuTTY and WinSCP
    • Experts warn IT teams to be careful when downloading software

    Experts have uncovered a malicious campaign using SEO-optimized fake landing pages to deploy a malware loader called Oyster.

    Cybersecurity researchers Arctic Wolf found threat actors have created numerous landing pages that impersonate PuTTY and WinSCP, two popular Windows tools used to connect securely to remote servers.

    These pages are seemingly identical to their legitimate counterparts, and when people search on Google for these tools (mostly IT, cybersecurity, and web development professionals), they could be tricked into opening the wrong website. Since nothing on the sites would raise their suspicion, they might download the tool – which would work as intended, but it would also deliver Oyster, a known malware loader that is also sometimes called Broomstick, or CleanUpLoader.


    You may like

    Other software abused, too

    “Upon execution, a backdoor known as Oyster/Broomstick is installed,” Arctic Wolf explained. “Persistence is established by creating a scheduled task that runs every three minutes, executing a malicious DLL (twain_96.dll) via rundll32.exe using the DllRegisterServer export, indicating the use of DLL registration as part of the persistence mechanism.”

    Oyster is a stealthy malware loader used to deliver additional malicious payloads onto infected Windows systems, often as part of multi-stage attacks. It uses techniques like process injection, string obfuscation, and command-and-control via HTTPS to evade detection and maintain persistence.

    These are some of the fake websites used in the attacks:

    updaterputty[.]com
    zephyrhype[.]com
    putty[.]run
    putty[.]bet, and
    puttyy[.]org

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    While Arctic Wolf only mentioned PuTTY and WinSCP, it stressed that other tools may have been abused in the same manner, too. “While only Trojanized versions of PuTTY and WinSCP have been observed in this campaign, it is possible that additional tools may also be involved,” they said.

    Out of an abundance of caution, IT pros are advised to only download software from trusted sources, and to type in addresses themselves, rather than just googling them and clicking on the top result.

    Via The Hacker News

    You might also like

    careful Click damaging Google malware results search
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIDShield review | TechRadar
    Next Article Moonvalley’s ‘ethical’ AI video model for filmmakers is now publicly available
    Techurz
    • Website

    Related Posts

    Security

    New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

    October 14, 2025
    Security

    Samsung Galaxy Z Fold 7 vs. Google Pixel 10 Pro Fold: We compared the two, and here’s the verdict

    October 11, 2025
    Security

    Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

    October 10, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    How Threat Hunting Builds Readiness

    October 14, 2025

    SonicWall VPNs face a breach of their own after the September cloud-backup fallout

    October 14, 2025

    The best Apple TV VPNs of 2025: Expert tested and reviewed

    October 14, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.